메뉴 건너뛰기




Volumn 12, Issue , 2010, Pages

Security analysis of an untrusted source for quantum key distribution: Passive approach

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ROUTING; ANALYTICAL EXPRESSIONS; BEAM SPLITTERS; DATA SIZE; INPUT PULSE; OPTICAL SWITCHING; PASSIVE ESTIMATION; QUANTUM KEY DISTRIBUTION; RANDOM NUMBER GENERATORS; REAL-LIFE APPLICATIONS; SECURITY ANALYSIS; SIMULATION RESULT; STATISTICAL FLUCTUATIONS; UNCONDITIONAL SECURITY;

EID: 77649166917     PISSN: 13672630     EISSN: None     Source Type: Journal    
DOI: 10.1088/1367-2630/12/2/023024     Document Type: Article
Times cited : (52)

References (40)
  • 2
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • Ekert A K 1991 Quantum cryptography based on Bell's theorem Phys. Rev. Lett. 67 661
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661
    • Ekert, A.K.1
  • 3
    • 77649151546 scopus 로고    scopus 로고
    • Quantum cryptography
    • (New York: Springer) (arXiv:0803.2507)
    • Lo H-K and Zhao Y 2009 Quantum cryptography Encyclopedia of Complexity and System Science vol 8 (New York: Springer) pp 7265-7289 (arXiv:0803.2507)
    • (2009) Encyclopedia of Complexity and System Science , vol.8 , pp. 7265-7289
    • Lo, H.-K.1    Zhao, Y.2
  • 8
    • 33846980802 scopus 로고    scopus 로고
    • Unconditional security of practical quantum, key distribution
    • Inamori H, Lütkenhaus N and Mayers D 2007 Unconditional security of practical quantum, key distribution Eur. Phys. J. D 41 599
    • (2007) Eur. Phys. J. , vol.D 41 , pp. 599
    • Inamori, H.1    Lütkenhaus, N.2    Mayers, D.3
  • 9
    • 0041415963 scopus 로고    scopus 로고
    • Quantum, key distribution with high loss: Toward global secure communication
    • Hwang W Y 2003 Quantum, key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91 057901
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 057901
    • Hwang, W.Y.1
  • 10
    • 5044243044 scopus 로고    scopus 로고
    • Quantum key distribution with vacua or dim pulses as decoy states
    • Lo H-K 2004 Quantum key distribution with vacua or dim pulses as decoy states Proc. IEEE Int. Symp. on Information Theory p 137
    • (2004) Proc. IEEE Int. Symp. on Information Theory , pp. 137
    • Lo, H.-K.1
  • 11
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum, key distribution
    • Lo H-K, Ma X and Chen K 2005 Decoy state quantum, key distribution Phys. Rev. Lett. 94 230504
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 12
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum, key distribution
    • Ma X, Qi B, Zhao Y and Lo H-K 2005 Practical decoy state for quantum, key distribution Phys. Rev. A 72 012326
    • (2005) Phys. Rev. A , vol.72 , pp. 012326
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 13
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • Wang X-B 2005 Beating the photon-number-splitting attack in practical quantum cryptography Phys. Rev. Lett. 94 230503
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 14
    • 27144532069 scopus 로고    scopus 로고
    • Decoy-state protocol for quantum, cryptography with four different intensities of coherent light
    • Wang X-B 2005 Decoy-state protocol for quantum, cryptography with four different intensities of coherent light Phys. Rev. A 72 012322
    • (2005) Phys. Rev. A , vol.72 , pp. 012322
    • Wang, X.-B.1
  • 15
    • 33344454530 scopus 로고    scopus 로고
    • Experimental quantum key distribution with decoy states
    • Zhao Y, Qi B, Ma X, Lo H-K and Qian L 2006 Experimental quantum key distribution with decoy states Phys. Rev. Lett. 96 070502
    • (2006) Phys. Rev. Lett. , vol.96 , pp. 070502
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 16
    • 39049171347 scopus 로고    scopus 로고
    • Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber
    • DOI 10.1109/ISIT.2006.261920, 4036338, Proceedings - 2006 IEEE International Symposium on Information Theory, ISIT 2006
    • Zhao Y, Qi B, Ma X, Lo H-K and Qian L 2006 Simulation and implementation of decoy state quantum key distribution over 60 km telecom fiber Proc. IEEE Int. Symp. on Information Theory pp 2094-2098 (Pubitemid 351244469)
    • (2006) IEEE International Symposium on Information Theory - Proceedings , pp. 2094-2098
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 19
    • 77649141651 scopus 로고    scopus 로고
    • www.idquantique.com
  • 20
    • 77649084367 scopus 로고    scopus 로고
    • www.magiqtech.com
  • 21
    • 33746447539 scopus 로고
    • Über den. zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem (in German)
    • Pólya G 1920 Über den. zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das Momentenproblem (in German) Math. Z. 8 171
    • (1920) Math. Z. , vol.8 , pp. 171
    • Pólya, G.1
  • 24
    • 46249109047 scopus 로고    scopus 로고
    • Experimental verification of the feasibility of a quantum channel between space and earth
    • Villoresi P et al 2008 Experimental verification of the feasibility of a quantum channel between space and earth New J. Phys. 10 033038
    • (2008) New J. Phys. , vol.10 , pp. 033038
    • Villoresi, P.1
  • 25
    • 33846431595 scopus 로고    scopus 로고
    • Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
    • Wang X-B, Peng C-Z and Pan J-W 2007 Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source Appl. Phys. Lett. 90 031110
    • (2007) Appl. Phys. Lett. , vol.90 , pp. 031110
    • Wang, X.-B.1    Peng, C.-Z.2    Pan, J.-W.3
  • 28
    • 67949124558 scopus 로고    scopus 로고
    • Decoy-state quantum key distribution with both source errors and statistical fluctuations
    • Wang X-B, Yang L, Peng C-Z and Pan J-W 2009 Decoy-state quantum key distribution with both source errors and statistical fluctuations New J. Phys. 11 075006
    • (2009) New J. Phys. , vol.11 , pp. 075006
    • Wang, X.-B.1    Yang, L.2    Peng, C.-Z.3    Pan, J.-W.4
  • 30
    • 54749155620 scopus 로고    scopus 로고
    • Experimental quantum key distribution with an untrusted source
    • Peng X, Jiang H, Xu B, Ma X and Guo H 2008 Experimental quantum key distribution with an untrusted source Opt. Lett. 33 2077
    • (2008) Opt. Lett. , vol.33 , pp. 2077
    • Peng, X.1    Jiang, H.2    Xu, B.3    Ma, X.4    Guo, H.5
  • 31
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122 km of standard telecom fiber
    • Gobby C, Yuan Z L and Shields A J 2004 Quantum key distribution over 122 km of standard telecom fiber Appl. Phys. Lett. 84 3762
    • (2004) Appl. Phys. Lett. , vol.84 , pp. 3762
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 32
    • 0004011867 scopus 로고    scopus 로고
    • 3rd edn (New York: McGraw-Hill) chapter 12.5
    • See, e.g., Keiser G 2000 Optical Fiber Communications 3rd edn (New York: McGraw-Hill) chapter 12.5
    • (2000) Optical Fiber Communications
    • Keiser, G.1
  • 33
    • 66249132354 scopus 로고    scopus 로고
    • Megabits secure key rate quantum key distribution
    • Zhang Q et al 2009 Megabits secure key rate quantum key distribution New J. Phys. 11 045010
    • (2009) New J. Phys. , vol.11 , pp. 045010
    • Zhang, Q.1
  • 36
    • 34547400660 scopus 로고    scopus 로고
    • Upper bounds of eavesdropper's performances in finite-length code with the decoy method
    • DOI 10.1103/PhysRevA.76.012329
    • Hayashi M 2007 Upper bounds of eavesdropper's performances in. finite-length code with decoy method Phys. Rev. A 76 012329 (Pubitemid 47173757)
    • (2007) Physical Review A - Atomic, Molecular, and Optical Physics , vol.76 , Issue.1 , pp. 012329
    • Hayashi, M.1
  • 38
    • 44249110247 scopus 로고    scopus 로고
    • Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing
    • DOI 10.1103/PhysRevLett.100.200501
    • Scarani V and Renner R 2008 Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing Phys. Rev. Lett. 100 200501 (Pubitemid 351725955)
    • (2008) Physical Review Letters , vol.100 , Issue.20 , pp. 200501
    • Scarani, V.1    Renner, R.2
  • 40
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random, variables
    • Hoeffding W 1963 Probability inequalities for sums of bounded random, variables J. Am. Stat. Assoc. 58 13
    • (1963) J. Am. Stat. Assoc. , vol.58 , pp. 13
    • Hoeffding, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.